Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Security Issues and Challenges in Cloud Computing
Introduction to Security Computer Networks Computer Networks Term B10.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Computer Security and Penetration Testing
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
BotNet Detection Techniques By Shreyas Sali
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
--Harish Reddy Vemula Distributed Denial of Service.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
AN INSIDE LOOK AT BOTNETS Barford, Paul and Yegneswaran Advances in Information Security, Springer, 2006 Kishore Padma Raju.
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Topic 5: Basic Security.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
TMG Client Protection 6NPS – Session 7.
Instructor Materials Chapter 7 Network Security
AbbottLink™ - IP Address Overview
Test 3 review FTP & Cybersecurity
An overview over Botnets
Presentation transcript:

Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.

 Bot a small program to remotely control a computer  Botnet is a network of zombies, i.e. compromised computers under control of an attacker.

 In following picture [1] shows the life- cycle of a botnet infection and the contact with the botmaster :   Infection strategies used by the masters are often seen when examining other malware such as self- replicating worms, viruses, etc. but also can be spread by making a victim execute some form of malicious code on his machine. Many attachments are simply these executable files. 

    The next step taken by a new bot is to contact a DNS server for the resolving of the DNS name of the IRC server (the IRC server’s name is given in the executable and a DNS query is made to acquire the server’s IP address). This step allows the master to retain control of the net also if the IP address associated with the DNS name of the IRC server gets black- listed.

 The next step taken by a new bot is to contact a DNS server for the resolving of the DNS name of the IRC server (the IRC server’s name is given in the executable and a DNS query is made to acquire the server’s IP address). This step allows the master to retain control of the net also if the IP address associated with the DNS name of the IRC server gets black-listed.

 The fact that IRC channels allow several forms of communication as well as data dissemination and that many open-source implementations are available make this protocol just suitable for botmasters.   As the C&C channel is also specified in the binary, the bot can now establish an IRC connection with the server and join the given channel. For this purpose, three steps of authentication are required: first of all the bot authenticates itself to the server with the PASS message, then it also has to authenticate itself with a password, to the master in order to join the channel.

 Lastly the botmaster also needs to authenticate himself to the bot before being able to send any command. The first two aim to keep outsiders away from the C&C channel, and the last one prevents the bots from being overtaken by other masters. 

 When the join has successfully occurred, the bot executes the channel’s topic, which contains the default commands that every bot has to execute. Often it occurs that all bots on the channel are able to hear every exchanged message and this characteristic is used on this paper for the acquisition of insider information. However, sometimes broadcasting is not allowed to prevent saturation. 

 3 things are required for it & they are:  bot:- a small program that can remotely perform certain functions.

C&c server

 Network of zombies

Where to find a bot  Find a script on the Internet & purchase a ready-to-go bot.  Prices vary from $5 to $1000 depending on the bot functionality.  Write yourself.

 C&C server  C&C server is simply a powerful computer which will give you direct access to zombies, or if needed will store stolen data. For example, to install IRC server

 Dedicated computer with installed software (fairly legal).  Buy a domain, since it should be set up as a web server Hosting - to make the server accessible from the Internet, it should be hosted by a hosting company.

 Creating zombies  Purchase/rent a network of zombies & compromise computers yourself.  Using software packages such as Mpack, Icepack and WebAttacker,using your brains.

 Agobot/Phatbot/Forbot/XtremBot:-  This is probably the best known bot. Currently, the AV vendor Sophos lists more than 500 known different versions of Agobot (Sophos virus analyses) and this number is steadily increasing. The bot itself is written in C++ with cross-platform capabilities and the source code is put under the GPL.Sophos virus analyses.

 mIRC-based Bots - GT-Bots:-  We subsume all mIRC-based bots as GT-bots, since there are so many different versions of them that it is hard to get an overview of all forks. mIRC itself is a popular IRC client for Windows. GT is an abbreviation for Global Threat and this is the common name used for all mIRC-scripted bots.mIRC

 Kaiten:-  This bot lacks a spreader too, and is also written for Unix/Linux systems. The weak user authentication makes it very easy to hijack a botnet running with kaiten. The bot itself consists of just one file.

 Q8 Bots:-  Q8bot is a very small bot, consisting of only 926 lines of C-code. And it has one additional noteworthiness: It's written for Unix/Linux systems. It implements all common features of a bot: Dynamic updating via HTTP-downloads, various DDoS- attacks (e.g. SYN-flood and UDP- flood), execution of arbitrary commands, and many more.

 Often botnets are used for Distributed Denial-of-Service ( ddos)attack. A DDoS attack is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network.

 Sniffing Traffic:-  Bots can also use a packet sniffer to watch for interesting clear-text data passing by a compromised machine. The sniffers are mostly used to retrieve sensitive information like usernames and passwords. But the sniffed data can also contain other interesting information.

 Software defaults should be the most secure settings, not the least secure & implement intrusion prevention systems. Implement spam filtering (w/CBL) and antivirus.  Implement organizational firewall and content filtering.  Blackhole botnet controllers and phishing websites upon verification & send regular notifications to downstream customers of detected issues.  Implement detection and filtering mechanisms where/when feasible.